Eskenzi PR ad banner Eskenzi PR ad banner

This Week's Gurus

Despite recurring headlines reporting high-level cyber attacks on organisations of various sizes, businesses are failing to protect themselves from escalating threats. The latest industry survey by ManageEngine, exploring UK-based IT professionals' outlook on cyber security and cloud adoption, has revealed startling levels of disregard towards IT security, with almost half of the respondents reporting that they install security updates and patches rarely, only occasionally, or never at all. This should come as a shock to...

Read more
vulnerability

Attackers love exploiting the naivety of users because it’s so easy. All it takes is one successful phishing email to persuade just one user to hand over their organizations login details. Once that hacker gains entry to your systems, you’re not going to find out until it’s too late — your anti-virus and perimeter systems aren’t programmed to pick up on access using legitimate login details, giving snoopers all the time in the world to,...

Read more

You’ve never been hacked before, and you’re confident you know where you critical or sensitive data is at all times. Why change something that’s working today? No business can ever be 100% sure where its data is or that it hasn’t been compromised in transit. Failure to recognise this issue is a board-level responsibility. You tick the boxes when it comes to GDPR, PCI DSS, HIPAA (and other regulations) so you’re secure. No company that...

Read more
malware

Why situation rooms hold the key to dealing with a data breach   You can imagine a scene in an action movie where the president is briefed on an ongoing incident, surrounded by generals, and chiefs of staff. Each in turn describe parts of the event, while the president asks questions and directs actions until the incident is over or a decisive move is made to combat the foe. What you can picture is called...

Read more

We often use similar terms in the security and healthcare. We talk about viruses and weaknesses and we put plans in place to reduce vulnerability, improve the health of the patient/network and protect it against attacks from external factors. We also act to mitigate the effects of attacks that do get through from the inside. As your doctor will tell you, to really improve overall health, we need a good monitoring regime and a system...

Read more
safe

Today’s “access-everything-anywhere-anytime” mobile data environment is great news for business productivity and performance but on the flipside it’s also a huge opportunity for cybercriminals. The increasing multitude of endpoints represents an ever-expanding playground in which to develop new ways of infiltrating corporate networks and making off with the digital goods. Malware, ransomware and a rising incidence of fileless attacks all constantly chip away at the perimeter while security pros now have to secure an environment...

Read more

By Javid Khan, CTO of LayerV, a Pulsant company Compliance is something organisations have been grappling with for some time. However, it has come into focus once again with the impending EU General Data Protection Regulation (GDPR). Time is running out. From May 25th, any business that falls foul of a data breach could face a potential fine of €20m, or 4% of annual turnover fines (whichever is greater). Despite increasingly stark warnings in the...

Read more

By Kat Weinberger, Intelligence Analyst, Flashpoint Flashpoint analysts have been tracking several small specialty shops in the Russian-language underground advertising access to the login credentials of customer accounts for travel and hospitality rewards programmes. Since the observed vendors appear to offer a small number of accounts from a large number of institutions, Flashpoint analysts believe the accounts were obtained incidentally while operating a botnet. These shops make rewards-point abuse more accessible to fraudsters who lack...

Read more

By Ralf Sydekum, Technical Manager, F5 Networks The face of finance is changing. Many institutions are abandoning the high street and moving towards a faster, more responsive 24-hour on-line services to meet customer demand. Yet, as digital engagement increases, hacker groups are using sophisticated tools to infiltrate operations and attack critical applications to gain access to data. According to the 2016 Verizon Data Breach Investigations Report, 82% of breaches in financial services were due to...

Read more
Risk Management

Written by Tom Turner, CEO and President, BitSight In my experience there are a number of common blind spots associated with vendor risk management (VRM), or ‘third party risk management’ as it is sometimes called. In this article I will share with the readers what I see as six top misconceptions surrounding VRM and suggest strategies for businesses to overcome or avoid some of these pitfalls. Only the highest value business relationships have the most...

Read more
Page 9 of 69 1 8 9 10 69